Skip to main content

New Anonymous User Identification and Key Establishment Protocol in Distributed Networks

  • Conference paper
Distributed Computing – IWDC 2005 (IWDC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3741))

Included in the following conference series:

  • 587 Accesses

Abstract

Recently, Wu and Hsu showed that Lee and Chang’s anonymous user identification and key establishment protocol was insecure with regard to two attacks and proposed an improved protocol, called the WH protocol. In this paper, we show that the WH protocol is still vulnerable to an unknown-key share attack. Then, we propose an improved protocol to address this problem by applying a mutual authentication method.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchanges, Designs. Codes and Cryptography 2, 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  2. Lee, W.B., Chang, C.C.: User identification and key distribution maintaining anonymity for distributed computer network. Computer Syst Sci Eng. 15(4), 211–214 (2000)

    MathSciNet  Google Scholar 

  3. Wu, T.-S., Hsu, C.-L.: Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computers and Security 23, 120–125 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, WH., Yoo, KY. (2005). New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds) Distributed Computing – IWDC 2005. IWDC 2005. Lecture Notes in Computer Science, vol 3741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11603771_46

Download citation

  • DOI: https://doi.org/10.1007/11603771_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30959-8

  • Online ISBN: 978-3-540-32428-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics